aboutsummaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)AuthorFilesLines
2017-08-24Merge "Use resource collector for the fencing -> stonith ordering"Jenkins1-1/+1
2017-08-24Merge "TLS-everywhere/libvirt: Make postsave command configurable"Jenkins2-3/+16
2017-08-24TLS-everywhere/libvirt: Make postsave command configurableJuan Antonio Osorio Robles2-3/+16
This is requires for when libvirt is running over a container, since we shouldn't try to restart the libvirt process, but the container itself. bp tls-via-certmonger-containers Change-Id: I26a7748b37059ea37f460d8c70ef684cc41b16d3
2017-08-24Merge "Add OVN DBs bundle support for pacemaker HA"Jenkins1-0/+159
2017-08-23Use resource collector for the fencing -> stonith orderingMichele Baldessari1-1/+1
Change Ifef08033043a4cc90a6261e962d2fdecdf275650 moved the stonith property definition to the pacemaker_master node. This means that the Class['tripleo::fencing'] -> Class['pacemaker::stonith'] ordering breaks on non-boostrap pacemaker nodes because the pacemaker::stonith property is not defined there any longer. Let's fix this by simply using a resource collector and set the ordering on that instead of adding yet anoth if statement. Ordering on enablement of stonith is actually more correct formally. Tested this on a broken setup successfully. Closes-Bug: #1712605 Change-Id: I616d340bdf75da9d9eb8b83b2e804dff3d07d58e
2017-08-22Add -s (silent) to curl command for CRL refreshJuan Antonio Osorio Robles2-3/+3
Without it, it doesn't reload the services it should. Change-Id: I43e6188700deb585f905ca700e69b6875f0ded45 Closes-Bug: #1712404
2017-08-21Merge "Do not create fs and server side key from manila"Jenkins2-28/+5
2017-08-21Merge "Certmonger: Make postsave command configurable"Jenkins6-16/+55
2017-08-19Merge "Support for Dell EMC VMAX Manila Driver"Jenkins3-2/+35
2017-08-19Merge "Support for Dell EMC VMAX ISCSI Cinder Driver"Jenkins3-13/+126
2017-08-19Merge "Allow configuring multiple insecure registries"Jenkins2-6/+31
2017-08-19Merge "Add TLS for nova metadata service"Jenkins2-0/+41
2017-08-18Certmonger: Make postsave command configurableJuan Antonio Osorio Robles6-16/+55
We need to make it configurable since these commands don't apply for containerized environments. This way we can restart containers or disable restarting and rely on other means. This stems from the issue that some services get accidentally started by certmonger on containerized environments, which makes the container initialization fail. bp tls-via-certmonger-containers Change-Id: I62ff89362cfcc80e6e62fad09110918c36802813
2017-08-18Merge "Enable TLS in the internal network for horizon"Jenkins1-4/+41
2017-08-18Merge "Create separate resource for HAProxy horizon endpoint"Jenkins2-49/+170
2017-08-18Merge "Move barbican's database creation to mysql profile"Jenkins3-7/+3
2017-08-18Merge "Release Pike rc1 - 7.3.0"Jenkins2-3/+3
2017-08-17Add TLS for nova metadata serviceJuan Antonio Osorio Robles2-0/+41
This adds a TLS proxy in front of it so it serves TLS in the internal network. bp tls-via-certmonger Change-Id: I97ac2da29be468c75713fe2fae7e6d84cae8f67c
2017-08-17Merge "Remove extra keystone admin haproxy listen and allow TLS"Jenkins2-18/+27
2017-08-17Allow configuring multiple insecure registriesJiri Stransky2-6/+31
If we're using local registries, we may want to use different registries e.g. for Ceph and for OpenStack. We allow multiple registries in general for this purpose, and we should also allow it in the insecure registry configuration. Change-Id: I5cddd20a123a85516577bde1b793a30d43171285 Related-Bug: #1709310
2017-08-17Merge "HAProxy: Set listen options for internal services too"Jenkins1-0/+1
2017-08-17Merge "Add logrotate-crond configuration"Jenkins3-0/+185
2017-08-17Enable TLS in the internal network for horizonJuan Antonio Osorio Robles1-4/+41
This enables the usage of TLS by the apache vhost that hosts horizon. bp tls-via-certmonger Change-Id: I7f2e11eb60c7b075e8a59f28682ecc50eeb95c3e
2017-08-17Create separate resource for HAProxy horizon endpointJuan Antonio Osorio Robles2-49/+170
This removes clutter from the main haproxy manifest and allows TLS in the internal network as well. Trying to keep the previous behavior. bp tls-via-certmonger-containers Change-Id: I1a68771cc7be7fb2b32abbad81db7890bd2c5502
2017-08-16Release Pike rc1 - 7.3.0Emilien Macchi2-3/+3
Change-Id: Id3277c97052e1dd88e6d2de6c5f92b32b95fa210
2017-08-17Move barbican's database creation to mysql profileJuan Antonio Osorio Robles3-7/+3
This makes sure that the database creation is only executed on the mysql profile (or container if that's enabled), and stops the conflicts and errors that were happening when barbican was deployed in containerized environments. Change-Id: Ib5c99482f62397fc5fb79a9dc537dfb06ee7f4df Closes-Bug: #1710928
2017-08-16Add OVN DBs bundle support for pacemaker HANuman Siddique1-0/+159
It uses the control-port 3125. Partial-bug: #1699085 Change-Id: I4787321e10cc35beeb5ec3f585dafb2268ea4f21
2017-08-16Add logrotate-crond configurationBogdan Dobrelya3-0/+185
Generate a cron job and a config for logrotate to be run against containerized services logs. Related-bug: #1700912 Change-Id: Ib9d5d8ca236296179182613e1ff625deea168614 Signed-off-by: Bogdan Dobrelya <bdobreli@redhat.com>
2017-08-16Remove extra keystone admin haproxy listen and allow TLSJuan Antonio Osorio Robles2-18/+27
The current code exposes an unused public listen directive in HAProxy for the keystone admin endpoint. This is not ideal and should be removed, as it exposes the service unnecessarily. We should stick to just exposing it to the ctlplane network as is the default. If folks really need to expose it to the public network, they can do so by modifying the ServiceNetMap through t-h-t and setting the keystone admin endpoint's network to external. Now, for "single" or "internal" haproxy endpoints, this adds the ability to detect if they're using the external network, and thus use TLS on it. Which is something a deployer would want if they exposed the keystone admin endpoint in such a way. Change-Id: I79563f62fd49a4f7654779157ebda3c239d6dd22 Closes-Bug: #1710909 Closes-Bug: #1639996
2017-08-16Merge "Replace enabled languages with excluded languages in UI"Jenkins2-30/+14
2017-08-15Merge "Enable TLS configuration for containerized HAProxy"Jenkins1-18/+97
2017-08-15Merge "Use rabbitmq ipv6 flag"Jenkins1-11/+4
2017-08-14Merge "Fix legacy nova/cinder encryption key manager configuration"Jenkins5-7/+46
2017-08-14Use rabbitmq ipv6 flagJohn Eckersberg1-11/+4
The internal details of enabling IPv6 have moved upstream[1], so just set the ipv6 flag when desired and don't worry about the details anymore! [1] https://github.com/puppetlabs/puppetlabs-rabbitmq/pull/552 Closes-Bug: #1710658 Change-Id: Ib22507c4d02f0fae5c0189ab7e040efac3df7e2f
2017-08-14Support for Dell EMC VMAX Manila Driverrajinir3-2/+35
This changes adds Dell EMC VMAX backend as composable service and matches the tripleo-heat-templates. Change-Id: I6e3b4ed6477c7ee56aef4e9849893229ca648c85 Implements: blueprint dellemc-vmax-manila
2017-08-14Support for Dell EMC VMAX ISCSI Cinder Driverrajinir3-13/+126
This changes adds Dell EMC VMAX ISCSI backend as composable service and matches the tripleo-heat-templates. Change-Id: Ifc169c60994856e382b76b72e020624ca64eef9f Implements: blueprint dellemc-vmax-isci
2017-08-12Merge "Run online_data_migrations for Ironic on upgrade"Jenkins1-2/+3
2017-08-12Merge "Enable TLS configuration for containerized Galera"Jenkins1-74/+118
2017-08-11Merge "Do not include manila ceph key resource twice"Jenkins1-10/+12
2017-08-11Merge "Modify resource dependencies of certmonger_user resources"Jenkins2-7/+11
2017-08-11Do not create fs and server side key from manilaJan Provaznik2-28/+5
Both fs and key are handled by ceph-ansible, move fs and key creation out of manila manifest to assure that it works with and without ceph-ansbile. Client-side manila key is created from ceph-mds and ceph-external templates in I6308a317ffe0af244396aba5197c85e273e69f68. Depends-On: I6308a317ffe0af244396aba5197c85e273e69f68 Partially-Implements: blueprint nfs-ganesha Change-Id: I2b5567a39ac8737e80758b705818cc1807dc8bf1
2017-08-11HAProxy: Set listen options for internal services tooJuan Antonio Osorio Robles1-0/+1
This was missed from a previous commit, as described in the bug report. We need to set this variable in this case as well, else it will use the undefined variable, thus ignoring anything that the user had set. Change-Id: I6810e7bb3eed16a6478974ac759c3f720a41120a Closes-Bug: #1709332
2017-08-11Modify resource dependencies of certmonger_user resourcesJuan Antonio Osorio Robles2-7/+11
In a containerized environment the haproxy class might not be defined, so this was made optional. On the other hand, this also retrieves the CRL before any certmonger_certificate resources are created. bp tls-via-certmonger-containers Change-Id: I2078da7757ff3af1d05d36315fcebd54bb4ca3ec
2017-08-10Do not include manila ceph key resource twiceJan Provaznik1-10/+12
When mds creates manila key [1], then manila manifest needs to check first if this resource already exists otherwise puppet fails. [1] I6308a317ffe0af244396aba5197c85e273e69f68 Change-Id: I3f18bbe476c4f43fa4e162cc66c5df443122cd0c
2017-08-10Merge "Enable TLS configuration for containerized RabbitMQ"Jenkins1-52/+76
2017-08-09Merge "Use clustercheck credentials to poll galera state in container"Jenkins1-3/+8
2017-08-09Enable TLS configuration for containerized HAProxyDamien Ciabrini1-18/+97
In non-containerized deployments, HAProxy can be configured to use TLS for proxying internal services. Fix the creation of the of the haproxy bundle resource to enable TLS when configured. The keys and certs files, as well as the crl file are all passed as configuration files and must be copied by Kolla at container startup. Change-Id: I4b72739446c63f0f0ac9f859314a4d6746e20255 Partial-Bug: #1709563
2017-08-09Merge "Enable innodb_buffer_pool_size configuration"Jenkins2-8/+18
2017-08-09Enable TLS configuration for containerized RabbitMQDamien Ciabrini1-52/+76
In non-containerized deployments, RabbitMQ can be configured to use TLS for serving and mirroring traffic. Fix the creation of the rabbitmq bundle resource to enable TLS when configured. The key and cert are passed as other configuration files and must be copied by Kolla at container startup. Change-Id: Ia64d79462de7012e5bceebf0ffe478a1cccdd6c9 Partial-Bug: #1709558
2017-08-07Merge "Update swift-proxy unit tests for puppet5"Jenkins1-1/+3